← Back to BrewedIntel
vulnerabilitymediumCredential StuffingWeak Passwords

Jan 20, 2026 • ESET WeLiveSecurity

Old habits die hard: 2025’s most common passwords were as predictable as ever

This report highlights a persistent security challenge regarding user authentication practices in 2025. Analysis indicates that despite ongoing security...

Source
ESET WeLiveSecurity
Category
vulnerability
Severity
medium

Executive Summary

This report highlights a persistent security challenge regarding user authentication practices in 2025. Analysis indicates that despite ongoing security awareness efforts, a significant portion of users continue to utilize predictable and easily compromiseable passwords. This behavior significantly elevates the risk of unauthorized access through brute-force attacks and credential stuffing campaigns. While no specific threat actors or malware families were identified in this specific dataset, the human element remains a critical vulnerability within organizational security postures. The continued prevalence of weak credentials suggests that existing password policies and user education programs require reinforcement. To mitigate this risk, organizations should enforce multi-factor authentication, implement password managers, and conduct regular security training. Ignoring this trend leaves systems exposed to common attack vectors that rely on poor credential hygiene rather than sophisticated exploit chains.

Summary

Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well

Published Analysis

This report highlights a persistent security challenge regarding user authentication practices in 2025. Analysis indicates that despite ongoing security awareness efforts, a significant portion of users continue to utilize predictable and easily compromiseable passwords. This behavior significantly elevates the risk of unauthorized access through brute-force attacks and credential stuffing campaigns. While no specific threat actors or malware families were identified in this specific dataset, the human element remains a critical vulnerability within organizational security postures. The continued prevalence of weak credentials suggests that existing password policies and user education programs require reinforcement. To mitigate this risk, organizations should enforce multi-factor authentication, implement password managers, and conduct regular security training. Ignoring this trend leaves systems exposed to common attack vectors that rely on poor credential hygiene rather than sophisticated exploit chains. Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well